{"id":210243,"date":"2025-04-01T06:23:46","date_gmt":"2025-04-01T11:23:46","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2025\/04\/phishing-platform-lucid-behind-wave-of-ios-android-sms-attacks"},"modified":"2025-04-01T06:23:46","modified_gmt":"2025-04-01T11:23:46","slug":"phishing-platform-lucid-behind-wave-of-ios-android-sms-attacks","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2025\/04\/phishing-platform-lucid-behind-wave-of-ios-android-sms-attacks","title":{"rendered":"Phishing platform \u2018Lucid\u2019 behind wave of iOS, Android SMS attacks"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/phishing-platform-lucid-behind-wave-of-ios-android-sms-attacks.jpg\"><\/a><\/p>\n<p>A phishing-as-a-service (PhaaS) platform named \u2018Lucid\u2019 has been targeting 169 entities in 88 countries using well-crafted messages sent on iMessage (iOS) and RCS (Android).<\/p>\n<p>Lucid, which has been operated by Chinese cybercriminals known as the \u2018XinXin group\u2019 since mid-2023, is sold to other threat actors via a subscription-based model that gives them access to over 1,000 phishing domains, tailored auto-generated phishing sites, and pro-grade spamming tools.<\/p>\n<p>Prodaft researchers note that XinXin has also been using the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/darcula-phaas-can-now-auto-generate-phishing-kits-for-any-brand\/\" target=\"_blank\" rel=\"nofollow noopener\">Darcula v3<\/a> platform for its operations, which indicates a potential connection between the two PhaaS platforms.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A phishing-as-a-service (PhaaS) platform named \u2018Lucid\u2019 has been targeting 169 entities in 88 countries using well-crafted messages sent on iMessage (iOS) and RCS (Android). Lucid, which has been operated by Chinese cybercriminals known as the \u2018XinXin group\u2019 since mid-2023, is sold to other threat actors via a subscription-based model that gives them access to over [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,6,1491],"tags":[],"class_list":["post-210243","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-robotics-ai","category-transportation"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/210243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=210243"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/210243\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=210243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=210243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=210243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}